temp445181488.exe

ColorProcess 应用程序

The application temp445181488.exe, “ColorProcess Microsoft 基础类应用程序退” has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘NetworkSaver’. While running, it connects to the Internet address 5-248-43-123.broadband.kyivstar.net on port 80 using the HTTP protocol.
Product:
ColorProcess 应用程序

Description:
ColorProcess Microsoft 基础类应用程序退

Version:
1, 0, 0, 1

MD5:
fc94427e27bd55884b8eaeb742a0978f

SHA-1:
d6aeafdad2c984943dc6b7cbfe29e56c71037d45

SHA-256:
96f9a1aa7fe702adabae77816f1349c62759d59b432ca902c989660dfcae3b11

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/15/2024 5:51:32 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.Updater.Startup
17.2.26.6

File size:
1 MB (1,097,560 bytes)

Product version:
1, 0, 0, 1

Copyright:
版权所有 (C) 1999

Original file name:
ColorProcess.EXE退退DProductName

File type:
Executable application (Win32 EXE)

Language:
Çince (Basitlestirilmis, ÇHC)

Common path:
C:\users\{user}\appdata\local\temp\temp445181488.exe

File PE Metadata
Compilation timestamp:
10/15/2016 6:17:25 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.4

Entry address:
0x852F

Entry point:
55, 8B, EC, 6A, FF, 68, 88, A5, 20, 00, 68, BC, 86, 20, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, E0, 94, 20, 00, 59, 83, 0D, 50, D0, 20, 00, FF, 83, 0D, 54, D0, 20, 00, FF, FF, 15, 94, 94, 20, 00, 8B, 0D, 44, D0, 20, 00, 89, 08, FF, 15, E8, 94, 20, 00, 8B, 0D, 40, D0, 20, 00, 89, 08, A1, E4, 94, 20, 00, 8B, 00, A3, 4C, D0, 20, 00, E8, 1D, 01, 00, 00, 39, 1D, 30, CF, 20, 00, 75, 0C, 68, B8, 86, 20, 00, FF, 15, D4, 94...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
96 KB (98,304 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
NetworkSaver

Command:
C:\users\{user}\appdata\local\temp\temp445181488.exe


The executing file has been seen to make the following network communications in live environments.

TCP (SMTP):
Connects to mail197.messagelabs.com  (216.82.242.44:25)

TCP (SMTP):
Connects to lsean.ezweb.ne.jp  (27.85.176.228:25)

TCP (SMTP):
Connects to exmta.mopera.net  (211.14.126.65:25)

TCP (SMTP):
Connects to ns01.jahis.jp  (118.22.22.236:25)

TCP (SMTP):
Connects to mta002.mail.vip.bbt.yahoo.co.jp  (182.22.12.118:25)

TCP (SMTP):
Connects to matusermx.rakuten.co.jp  (133.237.20.1:25)

TCP (HTTP):
Connects to dynamic-77-122-174-025.ricona.net.ua  (77.122.174.25:80)

TCP (HTTP):
Connects to dhcp-pool.net-77.121.34.host-16.sev.sevcable.net  (77.121.34.16:80)

TCP (HTTP):
Connects to CableLink-201-175-104-107.Hosts.Cablevision.com.mx  (201.175.104.107:80)

TCP (HTTP):
Connects to 95-27-103-59.broadband.corbina.ru  (95.27.103.59:80)

TCP (HTTP):
Connects to 5-248-43-123.broadband.kyivstar.net  (5.248.43.123:80)

TCP (HTTP):
Connects to 5-105-69-96.mytrinity.com.ua  (5.105.69.96:80)

TCP (HTTP):
Connects to 27.net119083070.t-com.ne.jp  (119.83.70.27:80)

TCP (HTTP):
Connects to 208.23-pool.nikopol.net  (176.112.23.208:80)

TCP (HTTP):
Connects to 179-228-201-124.user.vivozap.com.br  (179.228.201.124:80)

TCP (HTTP):
Connects to 176-8-244-146.broadband.kyivstar.net  (176.8.244.146:80)

Remove temp445181488.exe - Powered by Reason Core Security